
Cyber Security revision 58B
Authored by Wayne Hall
Computers
11th - 12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A non-self-replicating type of malware program containing malicious code that, when executed typically causes loss or theft of data, and possible system harm is a _______
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of attack that sends enough requests to overload a resource or even stopping its operation.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is another name for confidentiality of information?
consistency
trustworthiness
accuracy
privacy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a reason that internal security threats might cause greater damage to an organization than external security threats?
Internal users have direct access to the infrastructure devices.
Internal users can access the corporate data without authentication.
Internal users have better hacking skills.
Internal users can access the infrastructure devices through the Internet.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The individual user profile on a social network site is an example of a/an _________________ identity.
personal
social
online
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is used to check the integrity of data?
authentication
backup
checksum
encryption
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are three methods that can be used to ensure confidentiality of information? (Choose three.)
file permission settings
two factor authentication
data encryption
username ID and password
version control
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?